Category Archives: Encryption

End-to-End Encryption: How It Works, Uses, And Drawbacks | SPARROWS NEWS – Sparrows News

End-to-end encryption (E2EE) is a security measure used in digital communication to ensure that only the sender and intended recipient of a message can decrypt and read its contents, making it extremely difficult for third parties, including hackers, service providers, or government authorities, to intercept or access the information. Heres how it works:

E2EE is essential for safeguarding sensitive information and ensuring that only the intended parties can read the content of their communication. Here are some use cases for end-to-end encryption (E2EE) across various applications and industries:

These are just a few examples of how end-to-end encryption plays a crucial role in safeguarding sensitive data and maintaining privacy in various contexts. End-to-end encryption (E2EE) is a powerful privacy and security feature, but it does come with some drawbacks:

While E2EE is a valuable tool for protecting privacy and security, users should be aware of these drawbacks and make informed decisions about when and how to use it.

Dont miss the latest story follow us on WhatsApp Channel, Google News, YouTube, and Twitter for the fastest updates!

Here is the original post:
End-to-End Encryption: How It Works, Uses, And Drawbacks | SPARROWS NEWS - Sparrows News

Ransomware Crisis, Recession Fears Leave CISOs in Tough Spot – Dark Reading

Gartner projects worldwide IT spending will increase 5.5% this year, reaching $4.6 trillion, and forecasts information security and risk management products and services spending will grow 11.3%, topping $188.3 billion. However, with many chief economists believing a recession is on the horizon, executives and business leaders are being forced to make difficult cost reductions. One investment that may be facing cutbacks: cybersecurity.

Though cybersecurity programs tend to be fairly resilient in the face of economic uncertainty, chief information security officers (CISOs) and security leaders are still facing tough mandates and directives from other leadership to tighten spending, demonstrate value for investments, and double down on increasing efficiencies.

In a Hanover Research survey of over 650 financial decision makers, 47% of the responding organizations indicated economic disruption and recession as top business risks for 2023. Meanwhile, cybersecurity vulnerabilities fall by the wayside, with 11% ranking it as a top concern. This risk disparity comes at an exceptionally troubling time, as the world also grapples with rising geopolitical tensions and a ransomware epidemic.

Ransomware has exploded into one of the most damaging forms of malware and rapidly growing cybersecurity threats of our time. Verizon's "2023 Data Breach Investigations Report" (DBIR) reveals ransomware now accounts for one out of every four breaches, with 95% of incidents that experienced a loss costing $1 million to $2.25 million.

Unlike other types of malware, ransomware can destroy an organization in minutes, causing a ripple effect throughout society and the global economy.

With cybercriminals capitalizing on crises for exploitation, any compromise of an organization's security posture or a potential ransomware attack amid recession fears could leave them vulnerable to greater risks and in a dire financial position or, worse, out of business.

According to research from F5 Labs, malware was responsible for roughly 6% of US breaches in 2019, and by 2020 ransomware alone was a factor in 30%. By 2021, that number surged to almost 70% according to Verizon's 2022 DBIR.

Comparitech reveals publicly reported ransomware attacks dipped in 2022, but the amount of individuals' data exposed grew to nearly 115 million from 49.8 million in 2021, and ransom demand in the business sector rose to $13.2 million from $8.4 million in 2021.

Ransomware cybercrime is claiming victims left and right in 2023, from the US Marshals Service to Dole and Dish Network. In response, the White House has classified ransomware as a threat to national security, public safety, and economic prosperity. And despite government entities like the FBI, CISA, and OFAC enacting actions to counter ransomware, these steps alone aren't enough to end the evolving ransomware threat landscape.

With a new ransomware target being attacked every 14 seconds, organizations must prioritize ransomware prevention. With its developing sophistication, mitigating ransomware is increasingly more challenging. There's no silver bullet to eradicate attacks, and having to operate in a tight market adds a layer of complexity.

CISOs and security leaders must focus on the best return on investment while building out a multilayered approach for improving their overall IT security. One strategy to accomplish this is managing attack vectors using encrypted channels with preventive technologies that can stop adversaries before they have a chance to compromise networks or while they are executing their multistep campaigns.

Attackers not only employ malicious encryption to ransom a victim's files, they also leverage commonly adopted encryption standards to further their own ends.

Today, nearly 90% of all Internet traffic is encrypted with SSL/TLS, making it easy for cybercriminals to take advantage of cryptography and use it to mask ransomware to evade detection while using popular and successful breach tactics like phishing.

Ransomware gangs also take advantage of legitimate websites encrypted with SSL/TLS to look secure, but have been infected with drive-by downloads. And cybercriminals leech onto browser vulnerabilities that can lead to infection when the entry point is encrypted, allowing encrypted threats embedded with malicious payloads to go unnoticed.

Gaining visibility into encrypted traffic is a key aspect of managing encrypted threats, yet organizations should level up their defense to decrypt and inspect incoming and outgoing encrypted traffic, which is commonly called SSL Inspection or Break and Inspect (BNI), and automate traffic orchestration for enhanced efficacy and control.

Amid ongoing pressure to drive efficiencies with strained resources, it's critical for businesses to optimize their security investments. Decrypting, inspecting, and re-encrypting traffic remains an exclusive feature within a small subset of security devices. With the flood of SSL/TLS traffic, many of those devices can't handle traffic at large scale.

Consequently, security stacks can take a serious hit and be riddled with points of failure that can lead to greater chances of infected traffic bypassing decryption, as well as oversubscribed services that can increase total cost of ownership.

Combining robust decryption and orchestration of encrypted traffic with threat-prevention technology that can stop attacks before they happen and go beyond blocking and alerting indicators of compromise (IOCs) is crucial to staying ahead of attackers amid the ransomware crisis and potential global recession.

Excerpt from:
Ransomware Crisis, Recession Fears Leave CISOs in Tough Spot - Dark Reading

Simplify DoD Compliance with End-to-End Encrypted Email and File … – ThomasNet News

Welcome to Thomas Insights every day, we publish the latest news and analysis to keep our readers up to date on whats happening in industry. Sign up here to get the days top stories delivered straight to your inbox.

This article is sponsored byPreVeil, a provider of end-to-end encrypted email and file sharing systems designed to protect critical information and simplify CMMC, NIST 800-171, and ITAR compliance.

Achieving complete cybersecurity is a never-ending pursuit, especially as the number of cyberattacks continues to rise. Thats why the National Security Agency (NSA) recommends a Zero Trust framework, which assumes that a breach is inevitable or has already occurred. Additionally, the Department of Defense (DoD) is increasing its compliance requirements for contractors, making it more important than ever to implement robust and effective security measures. To remain competitive and demonstrate the ability to protect critical information, manufacturers, especially in the defense sector, have to show compliance with stringent cybersecurity standards, such as ITAR, CMMC, and NIST 800-171.

To assist,PreVeiloffers end-to-end encrypted email and file sharing systems designed to protect Controlled Unclassified Information (CUI) while also simplifying compliance. In addition to the product itself, PreVeil provides a complete compliance package, including documentation, templates, definitions, training videos, and more to educate customers and simplify their compliance process.

We strive to simplify security and compliance for manufacturers with an emphasis on ease of use and assisting our customers throughout their security and compliance journey, says Sanjeev Verma, chairman and co-founder of PreVeil. Our solutions are geared towards reducing the cost burden that often comes with achieving compliance, which is of paramount importance to our manufacturing customers.

Through the use of Zero Trust security, PreVeil ensures that information is only encrypted and decrypted on a users device, making it useless to attackers if hacked. PreVeils cybersecurity solutions are trusted by more than 800 defense manufacturers, financial institutions, law firms, consumer-focused businesses, and more.

Sanjeev Verma (SV):PreVeil is a company that builds end-to-end encrypted email and file sharing systems. These products are generally used by manufacturing companies, particularly defense contractors, as well as law firms, and financial institutions. What distinguishes us is that we offer arguably some of the best cybersecurity in the world. Defense contractors, law firms, and financial firms use us because we sit at the cusp of not only providing best-in-class cybersecurity solutions but also simplifying their compliance mandates.

As the world is moving forward, theres a greater demand for cybersecurity as well as compliance. For these regulated segments such as manufacturing, particularly for defense, we sit at the intersection of providing simple solutions that can reduce the cost and complexity of both cybersecurity and compliance for these companies.

SV:We are seeing increasing compliance requirements imposed on companies. In the defense segment, companies are required to protect critical information, which should be self-evident, but they are increasing regulations to protect whats called Controlled Unclassified Information (CUI). This includes contract information, defense designs, and so forth, that manufacturers have in their possession.

Specific compliance regimes that drive the adoption of our products include NIST 800-171, which is part of federal defense contracts; CMMC, which is an upcoming regulation that requires manufacturers to prove they are adequately protecting information; and ITAR, which involves defense companies and others sending information overseas.

With an increased emphasis on compliance, customers often come to us to get a clearer understanding of what the compliance regulations ask of them. CMMC, NIST 800-171, and ITAR can be very complex for a manufacturer to understand, so we assist customers in simplifying those complex regulations and providing them with an understanding of what is required of them. Then, we explain how PreVeils encrypted email and file-sharing systems can be used to provide the security and compliance these regulations require, while also simplifying and reducing the cost of their security and compliance journey.

SV:We simplify compliance with an uncompromising focus on cybersecurity. One way that we differentiate ourselves is that we dont cut corners to make you compliant. We come in and provide you with the best cybersecurity available anywhere in the world and yet simplify your compliance because our products are very easy to use. We provide an entire solution not only do we provide the product itself but also the full compliance package. We help our customers adopt our products as well as provide the documentation needed to ultimately get compliance.

We also have a series of help articles and videos that we call PreVeil University. Once you have the product and the documentation, you can then go to PreVeil University to get any of your questions answered regarding compliance and security.

At the end of the day, we are true to our mission of protecting critical information. We remain laser-focused on a security-first approach to compliance while bearing in mind, simplify, simplify, simplify.

SV:The entire federal government is now requiring NIST 800-171 compliance as the framework by which suppliers to the government, particularly the Defense Department, need to demonstrate security. NIST 800-171 is a series of 110 controls that need to be implemented in order to show that you are adequately protecting information in your systems, whether it be on phones, computers, or elsewhere.

A defense contractor used our system, and a United States Defense Department audit authority audited that customer for NIST 800-171 compliance. Our customer achieved a perfect 110 out of 110 controls. They used PreVeil in conjunction with other policies and procedures, and the combined result was the highest level of score for their system.

This not only proves that they were successfully protecting defense information, but it also provides a competitive advantage. Now, when prime contractors are looking for a supplier, this customer will be able to demonstrate their perfect compliance score.

SV:Compliance is a primary trend, but the other large trend is cybersecurity itself, particularly a concept referred to by the US government as Zero Trust. A lot of systems are protected by whats called perimeter defense. This means that security systems such as firewalls and others have been put in place to prevent attackers from accessing the information. What modern cybersecurity has recognized is that no matter how good the perimeter is, attackers will still get through because they are very sophisticated.

PreVeil was founded out of research at MIT using this principle of Zero Trust, which means we assume that everybody, including PreVeil, will be attacked. Systems that employ Zero Trust cybersecurity protect your information even when an attacker is able to access it.

We achieve this through end-to-end encryption. This means that emails and files remain encrypted at all times the only person who can decrypt it is the recipient. Even if the attacker gets to the servers where this information is stored, all they will get is gibberish because the information remains encrypted, and there are no keys available on those servers to decrypt them. End-to-end encryption represents one of the key frameworks by which Zero Trust is accomplished.

For more information about their end-to-end email and file sharing encryption systems, contact PreVeil today orbook a demo.

See the original post here:
Simplify DoD Compliance with End-to-End Encrypted Email and File ... - ThomasNet News

Quantum link can connect UK and Ireland – Optics.org

05Oct2023

York University team demonstrates that an ultra-secure connection should be possible on 224km sub-sea cable.

A research team led by York University - home to the UKs quantum communications hub - has demonstrated that ultra-secure quantum encryption protocols should work over a 224-kilometer commercial-grade submarine cable linking the UK and Ireland.

In a pilot project conducted in July, York professor Marco Lucamarini and colleagues tested key elements of continuous-variable quantum key distribution (CV-QKD) over a low-loss fiber deployed by the network operator euNetworks.

Known as Rockabill, the fiber-optic link runs between Portrane in Ireland and Southport in the UK and is said to offer remarkably low average attenuation, with no need for amplification or any repeaters.

Until now, no quantum link has ever been established between the two countries, nor on a span stretching this length on a subsea fiber-optic cable, stated the team in a release announcing the results.

Sensitive detectors crucialWhile quantum encryption has been possible for many years it has typically been limited to relatively short distances or specialty fiber links. This is because it relies on the physical properties of individual photons, and the chances of photon loss due to attenuation or scattering increase dramatically over longer distances.

One way around this is to use trusted nodes at stages in the fiber-optic link, but the euNetworks sub-sea link does not feature any such nodes.

The research team said that the experiments conducted on-site resulted in the successful transportation of both single and entangled photons, as well as in the successful measurement of optical phase - the key physical attribute used to secure twin-field and CV-QKD protocols.

Results from the project, which is funded via the UK National Quantum Technologies Programme, were also presented earlier this week in Amsterdam, during the NATO Symposium on Quantum Technology for Defence and Security.

The research team says that the success of the initial tests was largely due to some highly sensitive detectors deployed at the Southport terminal of the optical link, which are able to reduce environmental noise levels.

CV-QKD also has an advantage over traditional QKD links, with the latter requiring expensive low-temperature single-photon avalanche detectors (SPAD) to operate.

Real-world scenarioLucamarini said of the results so far: This is a truly exciting step forward in realising the full potential of quantum communications and for the future of securing private data in an environment that is shaping the so-called quantum internet.

This project also advances the real-world integration of quantum communication technology into existing global telecommunications and network infrastructure - taking it out of the lab into a real-world scenario.

euNetworks CEO Paula Cogan added: Rockabill, and [our] Super Highway network [that] it is part of, provide the ideal platform for new and progressive technologies that will enhance and innovate future network infrastructure.

The project partners say that further experiments will need to be carried out using the same cable line before services integrating CV-QKD encryption can be offered for protecting live data.

Quantum techniques like CV-QKD are under investigation for applications securing critical data against the potential threat of future quantum computers expected to be capable of cracking conventional computational encryption techniques.

They are of particular interest to governments, pharmaceutical and life science organisations, and the financial services sector.

See the original post:
Quantum link can connect UK and Ireland - Optics.org

Gigamons Precryption to block attacks hiding behind encryption – CSO Online

With promises of unprecedented visibility into encrypted traffic across virtual machines (VM) and container workloads, deep observability company Gigamon has launched a new "Precryption" technology.

Gigamon's GigaVUE 6.4 will deploy the Precryption technology to enable IT and security teams to conduct encryption-centric threat detection, investigation, and response across the hybrid cloud infrastructure.

"There's encryption everywhere now, including traffic or lateral movement within all virtualized and containerized environments, which is a good thing because it provides confidentiality for all of our information," said Michael Dickman, chief product officer at Gigamon. "The danger is that attackers can use encryption to hide their own movement and their own attacks, making it look like just another encrypted traffic flow, and that goes undetected."

The new Precryption technology will be delivered as a part of Gigamon's existing licenses and will be charged per usage (eg. Terabytes).

The new Precryption technology by Gigamon leverages Linux's Extended Berkeley Packet Filter (eBPF) technology to insert custom observability programs into the workload networks and bring them back to a centralized location.

eBPF is a flexible technology in the Linux kernel that allows users to write and load custom programs that run within the kernel space. eBPF programs are typically used for network packet filtering, monitoring, and other kernel-level tasks, but their use cases have expanded to various aspects of system observability and control.

Simply put, "Gigamon's new technology allows network traffic to be inspected by capturing traffic before encryption or after decryption using eBPF," said Christopher Steffen, vice president of research at EMA. "It doesn't require encryption keys and doesn't need to perform resource-intensive decryption."

"With the new tech, you don't actually have to manage, track or use keys," Dickman said. "There's no computing needed for an additional overlay of secondary decryption because that's how decryption usually works where you interrupt a traffic stream, and then decrypt it and re-encrypt, which is quite expensive, compute-wise."

The latest GigaVUE release has added a few other capabilities, other than the Precryption technology, to support visibility and decryption in a host of environments.

With the new "Cloud SSL decryption" capability, Gigamon looks to extend classic on-premises decryption capabilities to virtual and cloud platforms. "Application Metadata Intelligence" is another capability that allows for the detection of vulnerabilities and suspicious activities across both managed and unmanaged hosts.

Most significant and integral to Gigamon's Precryption is the "Universal Cloud Tap" capability that serves a single, executable tap for platforms to allow control and configuration of eBPF. "UCT is how we pull out visibility to network data in containers as well as VMs in a very efficient manner," Dickman said.

Gigamon's latest capabilities are well received by analysts who deem it long overdue. "So many organizations have network encryption requirements, but many do not have a method of adhering to these requirements of implementing network encryption while retaining the ability to monitor network traffic," Steffen said. "Precryption solves this problem, allowing security and network administrators to deliver on encryption controls while maintaining their ability to protect company resources by not losing visibility on their internal and external network traffic."

See the original post:
Gigamons Precryption to block attacks hiding behind encryption - CSO Online

Implement Object-Level Encryption and Policy With OpenTDF – DevOps.com

With an exponential increase in data being generated, stored and shared online, the issue of data security no longer belongs to IT alone. Software and application developers have been put on notice along with business owners and legal teams worldwide to not only maintain data privacy but to build more secure products. Theres no easy solution. However, there are resources readily available for devs to build security into the fabric of their products. One is called OpenTDF, an open source project that lets you integrate encryption and data policy controls into your new and existing apps to safeguard your data, and the sharing of it, for you as well as your users.

TDF, the trusted data format, was originally developed by the United States National Security Agency (NSA). Its an open standard for object-level encryption that keeps data protected and under the data owners control, wherever its created or shared. TDF includes cryptographically secured metadata that ensures consistent policy control throughout the data life cycle. Picture this: You can grant, revoke or turn off data access at any time, even if the data has left your network or application.

OpenTDF is an open source project that evolves the open TDF specification and provides a blueprint for getting started. There are a multitude of example applications that demonstrate the implementation logic, as well as streaming video and IoT use cases.

The OpenTDF project is based on Kubernetes and OCI containers, and there is a quick start guide to get you up and running with a development environment. The quick start process will install supplemental services like Keycloak as well as project-specific services like key access service (KAS) and Abacus (an ABAC front end for configuration and management of attribute-based access control). Once youve completed a quick start installation, youll have a basic OpenTDF cluster with a Keycloak identity provider, PostgreSQL data store and a single entry point at localhost with an Nginx ingress controller.

Theres an architectural diagram available on GitHub to see all of the services and service interactions.

Several SDKs are available for building on the OpenTDF framework, including JavaScript, Python, C++and Java. The client SDKs generally include basic examples for identity auth and creating a TDF-protected encrypted object.

Have you ever wondered how to make data access secure and simple? Using OpenTDF, developers can create that experience for their users. Lets walk through a sample web application that uses OpenTDF to encrypt and upload data to cloud storage.

The application well be using is called OpenTDF Secure Remote Storage. Its a react-based example that shows developers how to create encrypted data streams. These streams allow you to upload and download files from S3-compatible remote data stores while maintaining data protection. You can even remove encryption if needed.

To make things easy, well be using OpenTDFs client-web SDK, which authenticates against Keycloak using OpenID Connect (OIDC). Keep in mind that this example runs on your local machine. Its not designed for cloud or enterprise services.

Prerequisites: Youll need an S3-compatible storage object, like an Amazon S3 bucket. (You can create one for free here.)

First, install two CLI tools: Kind and Tilt. These will be used to deploy the OpenTDF services to your local machine. If youre on macOS, you can install them with a simple Homebrew command: brew install kind tilt.

Next, you will need the sample code on your local machine. You can either download the zip or clone the OpenTDF GitHub Repository using the following command: git clone git@github.com:opentdf/opentdf.git. This will create a directory called opentdf in your current location.

Now, navigate to the root directory of the sample application: cd opentdf/examples/secure-remote-storage. To deploy OpenTDF, youll need a local Kubernetes cluster. Use the Kind CLI to create one: kind create cluster --name opentdf.

Finally, start the application using Tilt: tilt up. This will launch the necessary OpenTDF services.

1. To begin, go to http://localhost:65432/secure-remote-storagein your web browser. This is where the Secure Remote Storage webpage is hosted.

2. Now, its time to log in. Use the following credentials (defined in the bootstraps config file): Username: user1 Password: testuser123

3. Then, choose a file from your computer to upload. It can be anything a text file, a PDF, or an image. Let your creativity flow! If you dont have a file handy, no worries. You can download an image by right-clicking on it and selecting Save As from this link.

4. Next, tell the application where to store your encrypted file. Provide the necessary JSON object that defines your S3-compatible object store. You can refer to the prerequisites for more details. (Optionally, you can save the configuration for future uploads. Just give it a name and click Save. This way, you wont need to define the object store again in the future.)

5. Now, its time to encrypt and upload. Click the encrypt and upload button, and watch the magic happen!

Whats happening behind the scenes? When you click encrypt and upload, the application uses the OpenTDF API to convert your selected file into a .tdf file. It applies AES-GCM encryption and attaches access controls to ensure that only authorized users, like you (in this case, testuser123), can access the data. Even if your data store is public, your data remains secure.

6. Ready to view and download your uploaded file? The table on the webpage lists all the files youve successfully uploaded. Each file has a download button next to it. Click that button, and the hosted file will be downloaded and decrypted on your local file system.

Excited to explore more? Now that youve seen OpenTDF in action, you can dive into the source code of this application. Use this sample application as a starting point to integrate OpenTDF into your own secure applications.

From a secure webcam app to a privacy-forward menstrual tracking app and more, the possibilities are endless with OpenTDF and the future is in developers hands. By building on OpenTDF, the valuable data flowing through your applications will be protected forever.

Learn more about OpenTDF at openTDF.io, and get the full quick-start guide, including more detailed instructions and other sample apps at the OpenTDF GitHub.

Cassandra Zimmerman, technical product manager at Virtru, contributed to this article.

Read the original:
Implement Object-Level Encryption and Policy With OpenTDF - DevOps.com

When a Quantum Computer Is Able to Break Our Encryption, It Won’t … – Lawfare

On Oct. 23, 2019, Google published a groundbreaking scientific research article announcing one of the holy grails of quantum computing research: For the first time ever, a quantum computer had solved a mathematical problem faster than the worlds fastest supercomputer. In order to maximize impact, the Google team had kept the article tightly under wraps in the lead-up to publicationunusually, they had not posted a preprint to the arXiv preprint server.

The article sank with barely a ripple in the expert academic community.

That wasnt because anyone disputed the significance of the Google teams milestone. Many experts still consider Googles demonstration to be the most important milestone in the history of quantum computing, comparable to the Wright brothers first flight in 1903. But most experts in the field had already read the article. A month earlier, a NASA employee who was involved with the research had accidentally posted a draft of the article on NASAs public web site. It was online for only a few hours before being taken back down, but that was long enough. Schrdingers cat was out of the bag.

This anecdote illustrates a fact with important policy implications: It is very difficult to keep groundbreaking progress in quantum computing secret.

One of the most important quantum computing algorithms, known as Shors algorithm, would allow a large-scale quantum computer to quickly break essentially all of the encryption systems that are currently used to secure internet traffic against interception. Todays quantum computers are nowhere near large enough to execute Shors algorithm in a practical setting, and the expert consensus is that these cryptanalytically relevant quantum computers (CRQCs) will not be developed until at least the 2030s.

Although the threat is not yet imminent, the consequences of a hostile actors execution of Shors algorithm could be incredibly dire. Encryption is at the very bedrock of most cybersecurity measures. A hostile actor who could read encrypted information transmitted over the internet would gain access to an immeasurable amount of critically sensitive informationfrom personal information such as medical or criminal records, to financial information such as bank account and credit card numbers, to cutting-edge commercial research and development, to classified national security information. The U.S. National Security Agency has said that the impact of adversarial use of a quantum computer could be devastating to [National Security Systems] and our nation.

Fortunately, preemptive countermeasures are already being put into place. The U.S. National Institute of Standards and Technology (NIST) is standardizing new post-quantum cryptography (PQC) protocols that are expected to resist attacks from both standard and quantum computers. Upgrading communications systems to use post-quantum cryptography will be a long, complicated, and expensive process that will extend over many years. The U.S. government has already begun the process: In May 2022, President Biden issued National Security Memorandum 10, which gives directives to all U.S. government agencies regarding the U.S. governments transition to post-quantum cryptography. Recognizing the long timelines that this transition will require, the memorandum sets the goal of mitigating as much of the quantum risk as is feasible by 2035.

Several experts have stated that one of the most important factors that will determine the severity of the threat posed by a CRQC is whether or not the public knows of the CRQCs existence. As soon as the existence of the CRQC becomes public knowledgeor is even considered plausibleand the threat becomes concrete, most vulnerable organizations will immediately move to upgrade all their communications systems to post-quantum cryptography. This forced transition may well be very expensive, chaotic, and disruptive, but it will fairly quickly neutralize most attack vectors (with one important exception mentioned below). The true nightmare scenario would be if a hostile actor (such as a criminal or terrorist organization or a hostile foreign government) covertly operated a CRQC over a long time period before PQC becomes universal, allowing the actor to collect a huge amount of sensitive information undetected.

Fortunately, it is extremely unlikely that any organization will develop a CRQC in secret, for at least four interrelated reasons.

First, anyone trying to develop a high-performance quantum computer will face stiff competition from commercial industry. Quantum computers have the potential to enable many commercial applications that have nothing to do with decryption, such as drug design, materials science, and numerical optimization. While there is huge uncertainty in the pace of technology development and the timelines for useful applications, some people have predicted that quantum computers could deliver over a trillion dollars in economic value over the next decade. Many private companies are racing to produce state-of-the-art quantum computers in order to profit from these applications, and there is currently no clear technical industry leader. Moreover, these companies are collectively extremely well funded: U.S. quantum computing startups alone have raised over $1.2 billion in venture capital, and that total does not include other major players such as national laboratories, large self-funding companies, or non-U.S. companies.

In the near term, these companies face some incentives to publicize their technical capabilities and other incentives to keep them proprietary. But in the long run, companies need to advertise their capabilities at a reasonable level of technical detail in order to attract customers. The closer the state of the art in commercial industry comes to the technical performance required to execute Shors algorithm, the clearer the threat will become to potential targets, and the more urgently they will prioritize upgrading to PQC.

Any organization attempting to secretly develop a CRQC would therefore need enormous financial resources in order to compete with the well-funded and competitive commercial industry, and it would need to stay far ahead of that industry in order to keep the element of surprise.

The second reason that a CRQC is unlikely to be developed in secret is that a relatively small number of people are at the cutting edge of quantum computing development in industry or academia, and they are well known within the expert community. Any organization attempting to secretly develop a CRQC would need to acquire world-class talentand if many of the greatest technical experts suddenly left their organizations or stopped publishing in the technical literature, then that fact would immediately be fairly evident, just as it was during the Manhattan Project. (However, this point may become less relevant in the future as the commercial industry matures. As the pool of expert talent grows and more information becomes business proprietary, public information about the top technical talent may decrease.)

Third, a CRQC might be physically difficult to hide. Its extremely difficult to estimate the physical resources that will be required to operate a CRQC, but my recent research suggests that a CRQC might plausibly draw 125 megawatts of electrical power, which is a significant fraction of the total power produced by a typical coal-fired power plant. A device that requires its own dedicated power plant would leave considerable evidence of its existence. Certain very capable organizations (such as national governments) might be able to conceal such a project, but doing so would not be easy and could well be impossible for smaller organizations.

The fourth reason has to do with the relative resources required for various quantum computing applications. As with most technical questions regarding the future of quantum computers, there is a huge amount of uncertainty here. But there is fairly strong theoretical evidence that many commercial applications of quantum computers will be significantly technically easier to implement than Shors algorithm. There is already very active research into the question of whether even todays crude quantum computers, known as noisy intermediate-scale quantum computers, might be able to deliver practical applications in the near future, although we dont yet know for sure.

In a more conservative technical scenario, all useful quantum applications might require a technically challenging hardware stabilization process known as quantum error correction, which has very high hardware requirements. But even in this scenario, there is evidence that some commercial applications of quantum computers (like the scientific modeling of chemical catalysis) will require lower hardware resources than Shors algorithm does. For example, one recent analysis estimated that computationally modeling a chemical catalyst used for direct air carbon capture would require only 20 percent as many qubits as executing Shors algorithm would. (A qubit is the basic building block of a quantum computer and one of the simplest ways to quantify its hardware performance.)

These analyses imply that commercial applications of quantum computing will very likely become technically feasible before decryption does. Unless an organization attempting to develop a CRQC is far more technically advanced than the commercial sectorwhich is unlikely, given the potentially huge economic value mentioned abovecommercial companies will probably beat the organization to applications, and they will announce their success. Even in the unlikely event that an organization does manage to develop a CRQC before the commercial industry develops a commercially useful quantum computer, that organization will face an enormously high opportunity cost of not using its CRQC for commercial applications that could deliver billions of dollars of value. Even if the organization were government sponsored, its government sponsor would face an enormous economic incentive to use its quantum computer for commercial applications rather than for intelligence collection.

What this means for policymakers is that the ultimate worst-case scenario, in which a hostile actor secretly deploys a CRQC for many years against totally unsuspecting victims, is highly unlikely. This does not in any way lessen the importance of quickly upgrading all critical communications systems to post-quantum cryptography, however, since doing so defends against harvest-now-decrypt-later attacks, in which a CRQC is deployed retroactively against saved encrypted data that was intercepted previously.

Operators of communications systems that transmit highly sensitive information should already be preparing to upgrade those systems cryptography to PQC, and they should perhaps develop contingency plans for even further accelerating that adoption if signs arise that CRQCs are approaching unexpectedly quickly. But policymakers should also understand that the commercial applications of quantum computers will probably emerge well before intelligence-collection applications do. This conclusion may carry implications regarding appropriate national-security-related policies such as export controls and outbound investment restrictions, as well as the broader balance of risks and benefits around quantum computers.

Finally, policymakers and cybersecurity analysts should avoid messaging that emphasizes the risk that CRQCs developed in secret could be imminent or already operational (unless, of course, they have additional information that runs counter to the points raised above). There is already more than enough reason to upgrade our communications systems to resist attacks from quantum computers as soon as possible. Even if completely unexpected attacks from a black-swan quantum computer are unlikely, attacks from known or suspected quantum computers would already be plenty bad enough.

Follow this link:
When a Quantum Computer Is Able to Break Our Encryption, It Won't ... - Lawfare

Verification of Integrity and Data Encryption (IDE) for CXL Devices – Design and Reuse

In continuation of our series on IDE blogs, Why IDE Security Technology for PCIe and CXL? and Verification of Integrity and Data Encryption(IDE) for PCIe Devices, this blog focuses on IDE verification considerations for CXL devices.

With increasing trends of AI, ML, and deep learning in the computing space, there is a focus on security features for SoCs catering to high performance computing (HPC), data analytics, automotive, etc. CXL is rapidly growing as the interconnect of choice for these applications, which does pose security concerns while transmitting mission-critical workloads. Therefore, CXL specification decides to incorporate security IDE features with a similar flow as PCIe IDE. In fact, the operational modus for FLITs transmitted on CXL.io semantics is the same as PCIe.

Coming to CXL.cachemem, AES-GCM is used with 256 key sizes for data encryption and integrity and 96-bit MAC for data protection. However, CXL.cachemem supports only Link IDE. Lets take a closer look at key verification aspects for CXL.cachemem IDE.

Click here to read more ...

Read the original post:
Verification of Integrity and Data Encryption (IDE) for CXL Devices - Design and Reuse

WhatsApp testing automatic security code verification for end-to-end encryption – Zee Business

Meta-owned WhatsApp is reportedly rolling out an 'automatic security code verification' feature for end-to-end encryption to a limited number of beta testers on Android.

COMMERCIAL BREAK

SCROLL TO CONTINUE READING

With this feature, the app will try to automatically verify if messages are end-to-end encryption without requiring any user intervention, according to WABetaInfo.

This process will be called Key Transparency, enhancing the overall security and privacy of users' conversations by checking if they are using a secure connection.

However, WhatsApp still provides users with the manual verification feature in case the automatic verification fails or it is not available.

According to the report, this feature is especially useful in situations where traditional QR code scanning or manual verification is difficult, such as when users need to easily verify encryption remotely.

By automating security code verification, the report said that WhatsApp hopes to provide added security and convenience for their users while verifying end-to-end encryption with no additional effort on their part.

Meanwhile, WhatsApp is reportedly working on bringing "third-party chat" support on Android in order to comply with the new European Union (EU) regulations.

The new feature will offer users the ability to communicate with each other using different apps.

For instance, someone from the Signal app could send a message to a WhatsApp user, even without a WhatsApp account.

The feature comes just days after the European Commission confirmed that Meta fits the definition of a "gatekeeper" under the EU's Digital Markets Act (DMA), which mandates that communication software like WhatsApp allow interoperability with third-party messaging apps by March 2024.

See the rest here:
WhatsApp testing automatic security code verification for end-to-end encryption - Zee Business

TCS+ | Altron’s Caryn Vos on why, in security, encryption is king – TechCentral

Caryn Vos

Cryptography and encryption are pivotal in modern cybersecurity operations. Altron Systems Integration senior manager for cryptography Caryn Vos tells TechCentrals TCS+ technology show about key reasons why this is the case.

Vos tells TechCentral editor Duncan McLeod about why organisations need to get encryption right if theyre serious about protecting their data assets.

The conversation explores the evolving security threat landscape and why companies need to respond appropriately. Ransomware remains a primary risk to South African organisations and organisations around the world but other risks are also emerging, says Vos.

In this episode of TCS+, Vos unpacks how encryption can help in the fight against ransomware and other threats; how encryption protects data both at move and at rest; the impact of corporate espionage; the role of regulations and legislation such as the Protection of Personal Information Act and how encryption can help with regulatory compliance; and how encryption can be used to build trust with customers and other stakeholders.

Dont miss a great discussion with an expert in the field.

Caryn Vos has specialised in information security for over 20 years, during which time she has dealt with all facets of this industry. This has given her a deep and broad understanding of information security as a whole. While she has focused on the financial services sector for many years, she has also worked with most industries during the course of her career. She has built an extensive network throughout the channel and end-user customer base and has extensive experience in dealing with end users as well as through partners. For more information, contact Vos via LinkedIn.

Altron Systems Integration is a specialist provider, leveraging world-class technology and leading practices to architect, implement and support sustainable ICT-based business solutions which are strategically aligned, fit for purpose, cost effective and optimised for performance. We have highly skilled, experienced professionals directed at solving business-critical customer problems through a consultative approach. We also bring our collective knowledge to every deployment engagement. From legacy integration to digital transformation, our solutions catalogue includes the full spectrum of ICT services. Few other organisations can claim the depth and breadth of the capabilities and experience we provide. For more information visit http://www.altronsystemsintegration.co.za or follow us on Facebook, LinkedIn and Twitter.

To subscribe toany of TechCentrals shows, including theTechCentral Show (TCS),TCS+orEverything PC, please use the links below:

TCS+ episodes arepaid for by the party concerned.

Here is the original post:
TCS+ | Altron's Caryn Vos on why, in security, encryption is king - TechCentral